关于我们
![]() ![]() |
数字顽疾:计算机病毒简史 读者对象:本书既适合IT从业者、网络安全研究者及相关学科学生阅读,亦是科技政策制定者以及所有对数智文明充满好奇的公众读者的理想读物。
本书以科学理性与人文关怀相融合的笔触,系统梳理了计算机病毒从理论萌芽、技术演化到当代智能化威胁的完整发展历程。通过翔实的历史考证与生动的案例剖析,本书深入揭示了病毒技术的理论溯源、核心迭代、关键性人物,及其与数字社会文化的深刻关联,精准勾勒了其在信息技术演进和网络攻防对抗中的多维生态位,并前瞻性地审视了由此引发的社会结构冲击、伦理治理困境及未来潜在风险。全书兼顾理论深度与科普表达,将复杂的技术原理、生动的安全攻防、演化的博弈逻辑,转化为通俗易懂的知识,为读者呈现了一场跨越技术、社会与文化的智慧盛宴。本书既适合IT从业者、网络安全研究者及相关学科学生阅读,亦是科技政策制定者以及所有对数智文明充满好奇的公众读者的理想读物。
张瑜,博士,教授,硕士生导师,广东技术师范大学智能安全学科学术带头人,中国指挥与控制学会网络空间安全专业委员会委员,中国计算机学会计算机安全专业委员会委员,中国计算机学会高级会员,中国网络空间安全协会会员,海南省“南海名家”、网络空间安全领军人才,海南省商用密码库入选专家,海南省网络安全与信息化专家。2013年获国家留学基金委资助,赴美国Sam Houston State University访学一年,与该校在网络空间安全领域进行了深度的科研合作。主持国家自然科学基金、广东省高校重点科研计划、广东省自然科学基金、海南省重点研发计划、海南省自然科学基金等国家计划项目的研究,获海南省科技进步三等奖1项。在国内外权威期刊上发表论文30余篇,出版学术专著/教材5本,申请国家发明专利6项。 石元泉,博士,湖南第一师范学院教授,硕士生导师,澳大利亚阿德莱德大学访问学者,湖南省普通本科高校大学计算机教学指导委员会委员、中国密码学会教育与科普工作委员会委员、湖南省高教学会计算机教育专委会副理事长、湖南省计算机学会常务理事;主要从事网络安全、智能计算等方面的研究工作,主持国家自然科学基金、中国博士后科学基金、湖南省自然科学基金等各类科研课题10余项。在国内外学术刊物上发表论文50余篇,其中SCI收录10余篇、EI收录近30篇,已被授权国际、国家发明专利4项。
基 础 篇
第1 章 信息技术:网络空间的物质基础·················································.2 1.1 计算思维与理论······································································.2 1.1.1 计算火种:史前计算·······················································.2 1.1.2 计算文明:图灵机··························································.4 1.1.3 计算体系:存储程序思想·················································.7 1.1.4 计算动力:摩尔定律·······················································.9 1.1.5 计算理念:开源思想·····················································.13 1.2 硬件技术·············································································.17 1.2.1 IT 发动机:CPU 芯片····················································.17 1.2.2 AI 助推剂:GPU 芯片····················································.20 1.2.3 数据仓库:内存芯片·····················································.23 1.3 软件技术·············································································.26 1.3.1 IT 动力源语:编程语言··················································.26 1.3.2 IT 生态平台:操作系统··················································.29 1.4 信息技术公司·······································································.32 1.4.1 PC 推广商:IBM ··························································.32 1.4.2 PC 原动力:Intel···························································.37 1.4.3 PC 生态盟主:Microsoft ·················································.40 1.4.4 数字创新者:Apple ·······················································.44 1.4.5 AI 原动力:NVIDIA······················································.49 1.5 风云人物·············································································.53 1.5.1 IT 筹划师:图灵···························································.54 1.5.2 IT 架构师:冯·诺依曼··················································.57 1.5.3 软件生态师:比尔·盖茨···············································.60 1.5.4 数字创新师:史蒂夫·乔布斯·········································.64 1.5.5 开源实践师:林纳斯·托瓦兹·········································.67 1.5.6 AI 梦想家:黄仁勋························································.70 第2 章 网络技术:网络空间的黏合剂··················································.75 2.1 国际互联网:网络空间的支撑平台············································.75 2.1.1 DARPA:美国科技引擎··················································.75 2.1.2 ARPANET:国际互联网前身···········································.78 2.1.3 Internet:国际互联网·····················································.80 2.2 暗网:隐匿的互联网平行世界··················································.84 2.3 移动互联网:掌上智能互联网··················································.86 2.4 物联网:万物互联网······························································.90 2.5 星联网:全域互联网······························································.92 第3 章 高新技术:网络空间的创新引擎···············································.98 3.1 人工智能技术·······································································.98 3.1.1 AI 起源与演化······························································.99 3.1.2 AI 生态······································································.105 3.2 区块链技术·········································································.109 3.2.1 区块链起源·································································.109 3.2.2 神秘缔造者:中本聪····················································.111 3.3 云计算技术·········································································.112 3.3.1 云淡风轻····································································.112 3.3.2 云深不知处·································································.114 演 化 篇 第4 章 数字顽疾:计算机病毒··························································.117 4.1 计算机病毒定义···································································.117 4.2 计算机病毒起源···································································.118 4.2.1 理论起源····································································.118 4.2.2 游戏起源····································································.119 4.2.3 科幻起源····································································.120 4.2.4 实验起源····································································.121 4.3 计算机病毒特性···································································.122 4.3.1 繁殖性·······································································.122 4.3.2 破坏性·······································································.123 4.3.3 传染性·······································································.124 4.3.4 潜伏性·······································································.124 4.3.5 可触发性····································································.125 4.3.6 衍生性·······································································.125 4.3.7 不可预见性·································································.126 4.4 计算机病毒类型···································································.127 4.4.1 按存储介质划分··························································.128 4.4.2 按感染系统划分··························································.128 4.4.3 按破坏性划分······························································.129 4.4.4 按算法功能划分··························································.130 4.5 计算机病毒结构···································································.131 4.6 计算机病毒环境···································································.134 4.6.1 计算机体系结构依赖····················································.135 4.6.2 计算机操作系统依赖····················································.138 4.6.3 文件系统及文件格式依赖··············································.140 4.6.4 解释环境依赖······························································.141 4.7 计算机病毒的生命周期··························································.143 4.7.1 病毒攻击阶段······························································.143 4.7.2 病毒防御阶段······························································.146 第5 章 嬗变之路:病毒演化简史·······················································.148 5.1 病毒演化逻辑与时间轴··························································.148 5.1.1 计算机病毒外部环境变迁视角········································.148 5.1.2 计算机病毒攻击载体视角··············································.152 5.1.3 计算机病毒编写者视角·················································.155 5.2 计算机病毒演化模式·····························································.158 5.2.1 计算机病毒个体演化模式··············································.158 5.2.2 计算机病毒群体演化模式··············································.175 5.2.3 计算机病毒与环境适应演化模式·····································.179 5.2.4 计算机病毒的演化趋势·················································.184 5.3 风云人物············································································.189 5.3.1 里奇·斯克伦塔··························································.189 5.3.2 弗雷德·科恩······························································.191 5.3.3 巴基斯坦兄弟······························································.192 5.3.4 罗伯特·莫里斯··························································.194 5.3.5 陈盈豪·······································································.196 5.4 病毒研究组织······································································.198 5.4.1 29A ···········································································198 5.4.2 VLAD ·······································································.199 5.4.3 VX Heaven ·································································.201 5.4.4 VirusView···································································.203 博 弈 篇 第6 章 绝地反击:反病毒简史··························································.206 6.1 反病毒软件简史···································································.206 6.2 反病毒技术简史···································································.210 6.3 风云人物············································································.213 6.3.1 约翰·迈克菲······························································.213 6.3.2 尤金·卡巴斯基··························································.215 6.3.3 马库斯·哈钦斯··························································.217 6.3.4 彼得·苏尔·································································.221 6.4 反病毒研究组织···································································.222 6.4.1 EICAR·······································································.223 6.4.2 CARO ·······································································.225 6.4.3 AMTSO ·····································································.226 6.4.4 Virus Bulletin·······························································.227 趋 势 篇 第7 章 魔道之争:病毒与反病毒博弈·················································.230 7.1 网络空间攻防博弈································································.230 7.1.1 网络空间博弈······························································.230 7.1.2 病毒与反病毒博弈·······················································.232 7.2 AI 赋能未来网络攻防····························································.236 7.2.1 AI 赋能“剑更锋”·······················································.237 7.2.2 AI 赋能“盾更坚”·······················································.239 7.2.3 AI 面临的攻防挑战·······················································.243 7.3 构建数字马其顿防线·····························································.244 后记·······························································································.251 参考文献·························································································.253
你还可能感兴趣
我要评论
|